Multiple trust modes for handling data
First Claim
Patent Images
1. A method comprising:
- presenting a user with a plurality of modes of operation, wherein the plurality of modes of operation define different trust options for handling sensitive data associated with the user;
receiving a selection from the user, wherein the selection is one of the plurality of modes of operation; and
handling sensitive data associated with the user in accordance with the selected mode of operation.
5 Assignments
0 Petitions
Accused Products
Abstract
A user is presented with multiple modes of operation, such that the multiple modes of operation define different trust options for handling data (such as login credentials or other sensitive data) associated with the user. A selection of one of the multiple modes of operation is received from the user. Data associated with the user is handled in accordance with the selected mode of operation.
61 Citations
23 Claims
-
1. A method comprising:
-
presenting a user with a plurality of modes of operation, wherein the plurality of modes of operation define different trust options for handling sensitive data associated with the user;
receiving a selection from the user, wherein the selection is one of the plurality of modes of operation; and
handling sensitive data associated with the user in accordance with the selected mode of operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
presenting a user with a low trust mode of operation, wherein the low trust mode of operation retrieves sensitive data from the user each time the user requests a service requiring the sensitive data;
presenting the user with a high trust mode of operation, wherein the high trust mode of operation stores sensitive data received from the user in an encrypted format;
receiving a selection from the user indicating one of the two modes of operation; and
handling sensitive data associated with the user in accordance with the selected mode of operation. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
presenting a user with a moderate trust mode of operation, wherein the moderate trust mode of operation stores sensitive data from the user in an encrypted format using a password known to the user;
presenting the user with a high trust mode of operation, wherein the high trust mode of operation stores sensitive data received from the user;
receiving a selection from the user indicating one of the two modes of operation; and
handling sensitive data associated with the user in accordance with the selected mode of operation. - View Dependent Claims (16)
-
-
17. A method comprising:
-
presenting a user with a moderate trust mode of operation, wherein the moderate trust mode of operation stores sensitive data from the user in an encrypted format using a password known to the user;
presenting the user with a low trust mode of operation, wherein the low trust mode of operation retrieves sensitive data from the user each time the user requests a service requiring the sensitive data;
receiving a selection from the user indicating one of the two modes of operation; and
handling sensitive data associated with the user in accordance with the selected mode of operation. - View Dependent Claims (18)
-
-
19. One or more computer-readable media having stored thereon a computer program that, when executed by one or more processors, causes the one or more processors to:
-
present a user with a plurality of modes of operation, wherein the plurality of modes of operation define different trust options for handling sensitive data associated with the user;
receive a selection from the user, wherein the selection is one of the plurality of modes of operation; and
process sensitive data associated with the user in accordance with the selected mode of operation. - View Dependent Claims (20, 21, 22, 23)
-
Specification